提交 #287775: keerti1924 Online-Book-Store-Website 1.0 1.0 Arbitrary File Upload信息

标题keerti1924 Online-Book-Store-Website 1.0 1.0 Arbitrary File Upload
描述The 'product_update.php' script in keerti1924's Online-Book-Store-Website is vulnerable to Arbitrary File Upload, posing a severe security risk. An authenticated admin user can exploit this flaw to upload malicious files, potentially leading to remote code execution or other security breaches. By uploading a crafted PHP file, attackers can execute arbitrary code on the server, compromising the system's integrity. Remediation involves implementing strict input validation and file upload restrictions, allowing only authorized file types and enforcing proper file permissions. Additionally, implementing file upload scanning and validation mechanisms can help detect and prevent the upload of malicious files.
来源⚠️ https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/File%20Upload/Arbitrary%20FIle%20Upload%20in%20product_update.php%20.md
用户
 nochizplz (UID 64302)
提交2024-02-25 16時41分 (2 年前)
管理2024-03-07 15時35分 (11 days later)
状态已接受
VulDB条目256038 [keerti1924 Online-Book-Store-Website 1.0 product_update.php?update=1 update_image 权限提升]
积分20

Want to stay up to date on a daily basis?

Enable the mail alert feature now!